A Secured Approach for Authentication System using Fingerprint and Iris

expertpanelΑσφάλεια

23 Φεβ 2014 (πριν από 3 χρόνια και 5 μήνες)

66 εμφανίσεις

A Secured Approach for Authentication System

using Fingerprint and Iris

AIM


The main aim of this project is to
prevent the phenomenon of the pension of falsely claim
through finger print and Iris identification.


PURPOSE


The purpose

of this project is to
use the fingerprint and Iris identification and IC card
combination to realize fingerprint authentication system collection.


BLOCK DIAGRAM



PS








POWER SUPPLY

P
OWER
S
UPPLY



RFID
READER


PC


LCD


FINGER

PRINT

MODULE


WEB
CAM




LPC2148
Micro

controller


KEYS

BUZZER


DC
MOTOR









DESCRIPTION


Due to huma
n body features with no duplicate characteristics, people put eyes turned to
biometrics. Computer fingerprint identification automatic identification technology is the earliest
and the most practical and the mature technology among the identification techn
ology.




Before starting the project initially the users will enroll their figure prints and eye images
that will be saved in the data base. In this project initially the user is made to show a RFID tag to
the reader
. If it is invalid card

it give
s the error message display like invalid person again it
displays to show your RFID card.

. If it is a valid one then the user have to enter the correct
password, if the user will entered the wrong password it will not moves the next step and the
buzzer w
ill be on, if the password accessing is continuously failed for three times means then
process will move to the initial condition i.e. RFID tag showing step. If the user will entered the
correct password then controller asks for a fingerprint access. If th
e finger print accessing is
failed then buzzer will be on and the process will move to the first step i.e. RFID tag showing
step. If fingerprint access is matched with stored fingerprint or authorized person finger print
then controller asks for a Iris reo
rganization. i.e., the person who ever want access that particular
accessories or things first he/she has to place his eye in front of the PC camera at that time it will
capture the image of eye and for accessing of those accessories or things again taking

the eye
image of same person and comparing with previous eye image in that same way we can access
some others with matching or compare of eye image and this whole process will done with the


Step Down

Transformer


Bridge

Rectifier


Filter

Circ
uit


Regulator
section

help of matlab code. If it matches then he or she will access to
that Particular accessories or thing
and the process goes on. If captured image does not matched with first taken image then the
controller gives a halt to the process and moves to the initial step RFID showing step.


TECHNOLOGY

RFID



RFID is an ac
ronym for
Radio Frequency Identification
.

In general terms, RFID is a means
of identifying a person or object using a radio frequency transmission. In other words
RFID is an
electronic method of exchanging data over radio frequency waves.
The technology ca
n be used
to identify, track, sort or detect a wide variety of objects.

There are three major components of an RFID system: the reader, the antenna, and the tags. Each
tag is associated with a unique number. When a tag is in the detection range of the read
er, the
number is read. Two types of tags can be found: active tags with a longer detection range and
passive tags with a shorter detection range. An RFID tag is usually attached to an object and the
information of the object along with the RFID number are

recorded in the database. Whenever
the RFID tag is sensed, the object can thus be identified.

Microcontroller:


A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM
or EPROM), various I / O features such as Serial ports,
Parallel Ports, Timer/Counters, Interrupt
Controller, Data Acquisition interfaces
-
Analog to Digital Converter (ADC), Digital to Analog
Converter (ADC), everything integrated onto a single Silicon Chip.

It does not mean that any micro controller should have

all the above said features on chip,
Depending on the need and area of application for which it is designed, The ON
-
CHIP features
present in it may or may not include all the individual section said above.

Any microcomputer system requires memory to store

a sequence of instructions making
up a program, parallel port or serial port for communicating with an external system, timer /
counter for control purposes like generating time delays, Baud rate for the serial port, apart from
the controlling unit calle
d the Central Processing Unit.

LCD Display Section:


This section is basically meant to show up the status of the project. This project makes
use of Liquid Crystal Display to display / prompt for necessary information.

RFID
:


RFID is an acronym for
Radio Frequency Identification
.

In general terms, RFID is a
means of identifying a person or object using a radio frequency transmission. In other words
RFID is an electronic method of exchanging data over radio frequency waves.
The technology
can be used
to identify, track, sort or detect a wide variety of objects.

There are three major components of an RFID system: the reader, the antenna, and the
tags. Each tag is associated with a unique number. When a tag is in the detection range of the
reader, the nu
mber is read. Two types of tags can be found: active tags with a longer detection
range and passive tags with a shorter detection range. An RFID tag is usually attached to an
object and the information of the object along with the RFID number are recorded
in the
database. Whenever the RFID tag is sensed, the object can thus be identified.

Finger Print Scanner:

A fingerprint
sensor

is an
electronic device

used to capture a
digital image

of the
fingerprint pattern. The captured image is called a live scan. This live scan is
digitally processed

to create a biometric template (a collection of
extracted features
) which is sto
red and used for
matching.

It supports wide range of fingerprint sensor interoperability giving you a freedom to
select suitable sensor that most fits to your application. Furthermore, the fingerprint data for
enrollment and verification are compatible amo
ng different sensors, even if they are based on
different technologies. This feature of unification presents application manufacturers and system
integrators with much more flexibility than ever before.


Keys Section:


With the help of these keys the users

can enroll their Finger prints and deleting their
figure prints.

PC Cam Section:


This section is basically meant to capture the IRIS of the persons and to transfer this
captured IRIS for Processing.


IRIS
:


In this we are using the Iris recognition tech
nique. Iris recognition analyzes the features
that exist in the colored tissue surrounding the pupil, which has 250 points used for comparison,
including rings, furrows, and freckles. Iris recognition uses a regular video camera system and
can be done from

further away than a retinal scan. It has the ability to create an accurate enough
measurement that can be used for Identification purposes, not just verification.


The probability of finding two people with identical iris patterns is consider
ed to be
approximately
1 in 10
52
(population of the earth is of the order 10
10
). Not even one
-
egged twins
or a future clone of a person will have the same iris patterns. The iris is considered to be an
internal organ because it is so well protected by the e
yelid and the cornea from environmental
damage. It is stable over time even though the person ages. Iris recognition is the most precise
and fastest of the biometric authentication methods
.

Buzzer:

This is the output device which we are using to indicate t
he unauthorized person.

LOCKER SYSTEM:

Here we are demonstrating a DC motor as the Locker for the authorized
persons in the Locker system mode.


SOFTWARE

1.

Embedded C

2.

Keil IDE

3.

Uc
-
Flash

4.

Matlab

HARDWARE

1. Micro Controller

2. RFID Reader

3. Fingerprint Module

4. Power supply

5. LCD

6. PC

7. IRIS scanner


ADVANTAGES OF THE PR
OJECT
:



Security and
management



High security
in the bank transactions



Convenience



Easier fraud
detection



Against to
cards duplication, misplacement and improper disclosure of password



Requi
res
physical presence of the person to be identified



Unique
physical or behavioral characteristic



Cannot be
borrowed, stolen, or forgotten


CONCLUSION:


A step by step approach in designing the id authentication system based on fingerprint
and iris identif
ication giving security to the users banking system and providing the
security for the locker system using a finger print scanner and iris has been followed. The
result obtained in providing the security is quite reliable in all the three modes.

The
system

has successfully overcome some of the aspects existing with the present
technologies, by the use of finger print biometric and iris biometric as the authentication
technology.


RESULT


By using this project we can
design and implementation of ID authe
ntication system based on
Fingerprint and IRIS Identification.